With sexy hardware, a powerful operating system, and easy-to-use
applications, Apple has made OS X the operating system of choice for
hackers everywhere. But as great as OS X is out of the box, hackers are
eager to push the limits of what it was designed to do (surprise). Tweak
and tune both software and hardware to start penetration testing or
software development. See how the best and brightest use OS X for
- Add Interfaces to the Mac Add interfaces to create a multi-interface
firewall or router, simulate a switch, add 802.3ad interface aggregation,
- Use the Mac as a Router See how a small low-power device such as a Mac
Mini or an iBook expanded with USB-based Ethernet ports can push packets
- WarDrive with Your Mac Configure and use the KisMAC WLAN discovery tool
- Penetration Test with OS X Discover how all the best tools can be run
- Automate Your Mac! Learn how to use Automator, AppleScript, and the
bash shell to automate tasks and create slick front ends for command-line
- Discover Juicy Mac Hacking Tools Compile Open Source tools directly on
- Hack the iPod Open your iPod, replace the battery, upgrade a 5GB iPod's
- Use OS X in a Windows Environment Access file shares on a Windows
server, mount network file systems via AppleScript, and connect to a
- PowerBook Mac Tricks Learn cool stunts you can do with the Apple motion
UPDATED TOC
- Chapter 1 A Network Admin's Guide to Using Mac OS X
- Chapter 2 Automation
- Chapter 3 OS X in a Microsoft Environment
- Chapter 4 WarDriving and Wireless Penetration Testing with OS X
- Chapter 5 Mac OS X for Pen Testers
- Chapter 6 Mac Tricks (Stupid Powerbook Stunts
- That Make You Look Like a God)
- Chapter 7 OS X For the Road Warrior
- Appendix A Hacking the iPod
http://www.amazon.com/exec/obidos/tg/detail/-/1597490407/
Download File Size:13.66 MB